The first GTACS of the new year will be at IDC Herzliya, Tue, Jan 24 at the Efi Arazi School of Computer Science
PROGRAM
09:00-09:30 Coffee & Registration
09:30-10:30 Amos Beimel, Ad Hoc PSM Protocols: Secure Computation without Coordination
10:30-11:00 Coffee break
11:00-12:00 Chris Williamson, Bounded Indistinguishability and the Complexity of Recovering Secrets
12:00-13:30 Lunch
13:30-14:00 Rant Session
14:00-14:30 Coffee break / reviewer responses
14:30-15:30 Aner Moshe Ben Efraim, Optimizing Semi-Honest Secure Multiparty Computation for the Internet
ABSTRACTS
- All presentations must include at least one duck
Amos Beimel, Ben-Gurion University
Ad-Hoc PSM Protocols: Secure Computation without Coordination
Abstract:
Chris Williamson, The Chinese University of Hong Kong
Bounded Indistinguishability and the Complexity of Recovering Secrets:
Abstract:
Motivated by cryptographic applications, we study the notion of bounded indistinguishability, a natural relaxation of the well studied notion of bounded independence.
We say that two distributions μ and ν over Σn are k-wise indistinguishable if their projections to any k symbols are identical. We say that a function f : Σn → {0, 1} is ε-fooled by k-wise indistinguishability if f cannot distinguish with advantage ε between any two k-wise indistinguishable distributions μ and ν over Σn.
We are interested in characterizing the class of functions that are fooled by k-wise indistinguishability. While the case of k-wise independence (corresponding to one of the distributions being uniform) is fairly well understood, the more general case remained unexplored.
When Σ = {0, 1}, we observe that whether f is fooled is closely related to its approximate degree. For larger alphabets Σ, we obtain several positive and negative results. Our results imply the first efficient secret sharing schemes with a high secrecy threshold in which the secret can be reconstructed in AC0. More concretely, we show that for every 0 < σ < ρ ≤ 1 it is possible to share a secret among n parties so that any set of fewer than σn parties can learn nothing about the secret, any set of at least ρn parties can reconstruct the secret, and where both the sharing and the reconstruction are done by constant-depth circuits of size poly(n). We present additional cryptographic applications of our results to low-complexity secret sharing, visual secret sharing, leakage-resilient cryptography, and eliminating “selective failure” attacks.
Joint work with Andrej Bogdanov, Yuval Ishai, and Emanuele Viola.
Aner Ben-Efraim, Ben-Gurion University
Optimizing Semi-Honest Secure Multiparty Computation for the Internet:
Abstract:
We construct highly efficient constant-round protocols for the setting of multi-party computation for semi-honest adversaries. Our protocols work by constructing a multiparty garbled circuit, as proposed in BMR (Beaver et al., STOC 1990). Our first protocol uses oblivious transfer and constitutes the first concretely-efficient constant-round multiparty protocol for the case of no honest majority. Our second protocol uses BGW, and is significantly more efficient than the FairplayMP protocol (Ben-David et al., CCS 2008) that also uses BGW. We ran extensive experimentation comparing our different protocols with each other and with a highly-optimized implementation of semi-honest GMW.